What We Learned From Honeypotting Attackers in the Cloud

Logo
Presented by

Bar Kaduri, Threat Research Team Leader—Tohar Braun, Research Technical Lead—Neil Carpenter, Principal Technical Evangelist

About this talk

With more and more sensitive information and critical systems residing in the cloud, it's essential for organizations to implement robust security measures to safeguard their cloud assets. However, to do this in an effective manner, it’s critical to understand what attackers are looking for and how they operate. In this webinar we will discuss the results from the Orca Security ‘2023 Honeypotting in the Cloud Report’, offering important insights into what attracts potential attackers as well as the tactics and techniques they use. In this session, you’ll learn: • How quickly discoverable vulnerable assets are on GitHub, HTTP, SSH, S3 Buckets, etc. • Resources bad actors are more likely to attack • Advice on secrets management, authentication, malicious process monitoring, and more.
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (89)
Subscribers (22608)
Orca Security is the industry-leading Cloud Security Platform that identifies, prioritizes, and remediates security risks and compliance issues across your cloud estate spanning AWS, Azure, Google Cloud and Kubernetes.